This paper makes the case for a centralized Bug Bounty Program of Last Resort to cover critical open-source projects and smaller vendors, who cannot fund them.
ICTSwitzerland | This white paper describes the risks of the digital supply chain and identifies essential measures for the security of both routine and critical functions in industry, government, the police and the military.
Analysis of the numbers and impact of leaked accounts of large data breaches on major Swiss industry sectors and the government. Perspective of the cyber threats attributable to software vulnerabilities and an insight into Swisscom's Bug Bounty program.
Over the course of the past decades, the development of new technologies (the Internet) and has opened up unbelievable opportunities that have durably changed our lives. Some of these emerging interaction between people, applications, and devices, make way for entirely new cyber attack scenarios.
This paper explains how cyber criminals operate botnets and compromise victims at large scale, and informs organizations how to best utilize cyber threat intelligence to protect their business and deal with infected customers.